I actually get a lot of shit for using a "methodology" sometimes from other hackers... hacking isn't some black magic. It's auditing functions, workflows, parameters, & configs for hundreds of vulnerability types. I don't know how you could be a good hacker without a methodology.
The key point is to build and use checklists. There are also some examples of what good checklists are like and their types. However, this is not why this book is great. It is great because it shows you the process. It is full of stories from which I’ve learned a lot.
21
39
4
280
Replying to @Jhaddix
We were using checklists 10+ years ago at @whitehatsec. Likely anyone who has worked in a professional setting with other pentesters would use them for consistency and quality.

Aug 20, 2019 · 12:33 PM UTC

1